Results 1  10
of
13,674
Regression Shrinkage and Selection Via the Lasso
 JOURNAL OF THE ROYAL STATISTICAL SOCIETY, SERIES B
, 1994
"... We propose a new method for estimation in linear models. The "lasso" minimizes the residual sum of squares subject to the sum of the absolute value of the coefficients being less than a constant. Because of the nature of this constraint it tends to produce some coefficients that are exactl ..."
Abstract

Cited by 4212 (49 self)
 Add to MetaCart
an interesting relationship with recent work in adaptive function estimation by Donoho and Johnstone. The lasso idea is quite general and can be applied in a variety of statistical models: extensions to generalized regression models and treebased models are briefly described.
The Quickhull algorithm for convex hulls
 ACM TRANSACTIONS ON MATHEMATICAL SOFTWARE
, 1996
"... The convex hull of a set of points is the smallest convex set that contains the points. This article presents a practical convex hull algorithm that combines the twodimensional Quickhull Algorithm with the generaldimension BeneathBeyond Algorithm. It is similar to the randomized, incremental algo ..."
Abstract

Cited by 713 (0 self)
 Add to MetaCart
is implemented with floatingpoint arithmetic, this assumption can lead to serious errors. We briefly describe a solution to this problem when computing the convex hull in two, three, or four dimensions. The output is a set of “thick ” facets that contain all possible exact convex hulls of the input. A variation
A blueprint for introducing disruptive technology into the internet
, 2002
"... This paper argues that a new class of geographically distributed network services is emerging, and that the most effective way to design, evaluate, and deploy these services is by using an overlaybased testbed. Unlike conventional network testbeds, however, we advocate an approach that supports bot ..."
Abstract

Cited by 593 (43 self)
 Add to MetaCart
architecture. Towards this end, the paper also briefly describes PlanetLab, an overlay network being designed with these four principles in mind.
Tor: The secondgeneration onion router,”
 in 13th USENIX Security Symposium. Usenix,
, 2004
"... Abstract We present Tor, a circuitbased lowlatency anonymous communication service. This secondgeneration Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, an ..."
Abstract

Cited by 1229 (33 self)
 Add to MetaCart
, and efficiency. We briefly describe our experiences with an international network of more than 30 nodes. We close with a list of open problems in anonymous communication. Overview Onion Routing is a distributed overlay network designed to anonymize TCPbased applications like web browsing, secure shell
Improving retrieval performance by relevance feedback
 Journal of the American Society for Information Science
, 1990
"... Relevance feedback is an automatic process, introduced over 20 years ago, designed to produce improved query formulations following an initial retrieval operation. The principal relevance feedback methods described over the years are examined briefly, and evaluation data are included to demonstrate ..."
Abstract

Cited by 756 (6 self)
 Add to MetaCart
Relevance feedback is an automatic process, introduced over 20 years ago, designed to produce improved query formulations following an initial retrieval operation. The principal relevance feedback methods described over the years are examined briefly, and evaluation data are included to demonstrate
Applications Of Circumscription To Formalizing Common Sense Knowledge
 Artificial Intelligence
, 1986
"... We present a new and more symmetric version of the circumscription method of nonmonotonic reasoning first described in (McCarthy 1980) and some applications to formalizing common sense knowledge. The applications in this paper are mostly based on minimizing the abnormality of different aspects o ..."
Abstract

Cited by 532 (12 self)
 Add to MetaCart
We present a new and more symmetric version of the circumscription method of nonmonotonic reasoning first described in (McCarthy 1980) and some applications to formalizing common sense knowledge. The applications in this paper are mostly based on minimizing the abnormality of different aspects
ProofCarrying Code
, 1997
"... This paper describes proofcarrying code (PCC), a mechanism by which a host system can determine with certainty that it is safe to execute a program supplied (possibly in binary form) by an untrusted source. For this to be possible, the untrusted code producer must supply with the code a safety proo ..."
Abstract

Cited by 1240 (27 self)
 Add to MetaCart
This paper describes proofcarrying code (PCC), a mechanism by which a host system can determine with certainty that it is safe to execute a program supplied (possibly in binary form) by an untrusted source. For this to be possible, the untrusted code producer must supply with the code a safety
Habitat monitoring: application driver for wireless communications technology
 In ACM SIGCOMM Workshop on Data Communications in Latin America and the Caribbean
, 2001
"... lecs.cs.ucla.edu As new fabrication and integration technologies reduce the cost and size of microsensors and wireless interfaces, it becomes feasible to deploy densely distributed wireless networks of sensors and actuators. These systems promise to revolutionize biological, earth, and environmenta ..."
Abstract

Cited by 424 (39 self)
 Add to MetaCart
level data. To address this, we propose a tiered system architecture in which data collected at numerous, inexpensive sensor nodes is filtered by local processing on its way through to larger, more capable and more expensive nodes. We briefly describe Habitat monitoring as our motivating application
By Andrzej Pekalski THE MOTIVATION FOR WRITING THIS MINI REVIEW IS THAT MANY APPROACHES TO PREDATOR–PREY (PP) SYSTEMS HAVE BEEN DISCOVERED, OVERLOOKED, AND THEN REDISCOVERED AGAIN YEARS LATER. BRIEFLY DESCRIBING SOME OF THE PAPERS
"... that physicists have written about the subject over the last 20 years thus seems advisable. In broad terms, a predator–prey model describes the dynamics of two kinds of entities—specifically, one kind could be destroyed on contact with the other. This review contains no detailed formulas, model desc ..."
Abstract
 Add to MetaCart
that physicists have written about the subject over the last 20 years thus seems advisable. In broad terms, a predator–prey model describes the dynamics of two kinds of entities—specifically, one kind could be destroyed on contact with the other. This review contains no detailed formulas, model
In the following, we briefly describe some of our work in approximating and representing shape, generatingand controlling motion, and generating and simulating group behaviors. Techniques for Approximating and Representing Shape
"... Approximate Convex Decomposition (acd). Convex decomposition can be useful because manyproblems can be solved more efficiently for convex objects. However, generating convex decompositions can be time consuming (sometimes intractable) and can result in unmanageably large decompositions. (a) (b) Figu ..."
Abstract
 Add to MetaCart
Approximate Convex Decomposition (acd). Convex decomposition can be useful because manyproblems can be solved more efficiently for convex objects. However, generating convex decompositions can be time consuming (sometimes intractable) and can result in unmanageably large decompositions. (a) (b) Figure 1: (a) An exact convex decomposition andan acd (with convexity less than 0.04) of the Davidmodel have 85,132 and 66 components, resp. (b)The convex hulls of the acd components representDavid's shape. To address these issues, we propose a partitioningstrategy that decomposes a given 2D or 3D model into approximately convex components, resulting inan approximate convex decomposition ( acd) [711].We compute an acd of a model recursively until allcomponents in the decomposition have concavity less than some specified (tunable) parameter. Examplesof
Results 1  10
of
13,674